18 research outputs found

    Dynamic human resource selection for business process exceptions

    Get PDF
    A key capability of today's organizations is to flexibly and effectively react to unexpected events. A critical case of an unexpected event is sudden unavailability of human resources, which was not properly addressed by existing resource allocation approaches. This paper proposes a systematic approach that analyzes event logs to select suitable substitutes if the initial human resources become unavailable. The approach uses process mining and social network analysis to derive a metric called degree of substitution, which measures how much the work experiences of the human resources overlap, from the two perspectives: task execution and transfer of work. Along with the metric, suitable substitutes are also identified. A simulation demonstrates that the approach identifies suitable substitutes more effectively and accurately than existing allocation methods such as role‐based allocation or random allocation. The proposed approach will increase the effectiveness of dynamic allocation of human resources, especially in an exceptional situation.11Yscopu

    Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks †

    Get PDF
    Abstract. In distributed sensor networks, the researches for authentication in sensor network have been focused on broadcast authentication. In this paper, we propose a message and its origin authentication protocol for data aggregation in sensor networks, based on one way hash chain and Merkle tree authentication with pre-deployment knowledge. Proposed protocol provides not only for downstream messages but also for upstream messages among neighbors, and it solves the secret value update issue with multiple Merkle trees and unbalanced energy consumption among sensor nodes with graceful handover of aggregator. In treating compromised node problem, our protocol provides an equivalent security level of pair-wise key sharing scheme, while much less memory requirements compared to pair-wise key sharing scheme

    Refreshing Distributed Multiple View and Replicas

    No full text
    In this paper we prescribe a replication server scheme with an algorithm DRF (Differential Refresh File) to refresh multiple materialized views and replicas in distributed environments. Before sending relevant tuples in server sites to client sites, an effective tuple reduction scheme is developed as a preprocessor to reduce the transmission cost. Because it utilizes differential files without touching base relations, the DRF scheme can help to minimize the number of lucks, which enhances the system's performance

    Novel congestion control scheme in next generation optical networks

    No full text
    In this paper, to improve the burst loss performance, we actively avoid contentions by proposing a novel congestion control scheme that operates based on the highest (called peak load) of the loads of all links over the path between each pair of ingress and egress nodes in an Optical Burst Switching (OBS) network. Document type: Part of book or chapter of boo

    An Integrated Process-Related Risk Management Approach to Proactive Threat and Opportunity Handling: A Framework and Rule Language

    No full text
    Managing risk in business processes has been a subject of active research in the past few years. The current uncertain global business environment especially requires organizations to adopt more effective risk management approaches that properly cope with both negative and positive impacts from risk in business process execution. This study introduces a process‐related risk management approach that can support comprehensive and proactive risk management during the runtime stage of business processes. First, it analyzes the behavioral requirements for proactive management of process‐related risk. Second, it suggests a framework that enables timely risk monitoring and treatment. Third, it offers a rule language as an implementation model for systematic support of the proposed risk management approach. Finally, it presents an architecture and prototype system to demonstrate the feasibility of the proposed framework and rule language. This approach overcomes the limitations of existing risk management approaches by identifying all necessary activities, as well as when and where they must be applied.111scopu

    Abstract Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce

    No full text
    With the advent of wireless communication and internet protocol, many technologies have been developed to provide mobile phone user with the wireless internet service. Security supporting wireless internet must be guaranteed at same level as the wired security. But PKI (Public Key Infrastructure) which is used for the security of e-commerce in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we consider why it is difficult to apply the wired PKI technology to the mobile phone and how to cope with these problems. We propose wireless PKI technology and illustrate that implementation result of the proposed wireless PKI technology on the newest mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management and verification between mobile phone and server. This results in the reduced module sizes to be able to install in mobile phone. Hence, the proposed WPKI technology shows that security is in the same level as the wired PKI and all PKI procedures are successfully processed in mobile phone. Ó 2006 Elsevier B.V. All rights reserved
    corecore